An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins
Jenkins gitlab |
|
| CPEs | cpe:2.3:a:jenkins:gitlab:*:*:*:*:*:jenkins:*:* | |
| Vendors & Products |
Jenkins
Jenkins gitlab |
Thu, 23 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-863 | |
| Metrics |
cvssV3_1
|
Wed, 22 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins. | |
| References |
|
Status: PUBLISHED
Assigner: jenkins
Published: 2025-01-22T17:02:51.699Z
Updated: 2025-01-23T16:11:07.171Z
Reserved: 2025-01-21T12:41:49.874Z
Link: CVE-2025-24397
Updated: 2025-01-23T16:10:58.849Z
Status : Analyzed
Published: 2025-01-22T17:15:13.670
Modified: 2025-10-03T00:19:00.040
Link: CVE-2025-24397
No data.